2024
DOI: 10.1371/journal.pone.0297534
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and compromise-resilient image encryption scheme for resource-constrained environments

Abdul Nasir Khan,
Abid Mehmood,
Muhammad Nasir Mumtaz Bhutta
et al.

Abstract: The secret keys produced by current image cryptosystems, which rely on chaotic sequences, exhibit a direct correlation with the size of the image. As the image dimensions expand, the generation of extensive chaotic sequences in the encryption and decryption procedures becomes more computationally intensive. Secondly, a common problem in existing image encryption schemes is the compromise between privacy and efficiency. Some existing lightweight schemes reveal patterns in encrypted images, while others impose h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 35 publications
0
0
0
Order By: Relevance